PUA - Ngrok Execution

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the use of Ngrok, a utility used for port forwarding and tunneling, often used by threat actors to make local protected services publicly available. Involved domains are bin.equinox.io for download and *.ngrok.io for connections.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND COMMANDLINE contains " tcp 139, tcp 445, tcp 3389, tcp 5985, tcp 5986" OR (COMMANDLINE contains " start " AND COMMANDLINE contains "--all" AND COMMANDLINE contains "--config" AND COMMANDLINE contains ".yml") OR (PROCESSNAME endswith "ngrok.exe" AND COMMANDLINE contains " tcp , http , authtoken ") OR COMMANDLINE contains ".exe authtoken ,.exe start --all" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems)